Index of cryptography articles

Results: 178



#Item
81Enterprise Encryption Bayly Eley

Enterprise Encryption Bayly Eley

Add to Reading List

Source URL: www.dis.arkansas.gov

Language: English - Date: 2014-03-20 10:22:16
82NIST/NSTIC-IDtrust 2012-NISTs Privacy Enhancing Cryptography Workshop

NIST/NSTIC-IDtrust 2012-NISTs Privacy Enhancing Cryptography Workshop

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 10:08:20
83Some results in group-based cryptography Ciaran Mullan Technical Report RHUL–MA–2012–1

Some results in group-based cryptography Ciaran Mullan Technical Report RHUL–MA–2012–1

Add to Reading List

Source URL: www.ma.rhul.ac.uk

Language: English - Date: 2012-01-12 06:55:53
84Microsoft Word[removed]Mocana Suite B (5 4fm) Security Policy.doc

Microsoft Word[removed]Mocana Suite B (5 4fm) Security Policy.doc

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-18 14:19:28
85

PDF Document

Add to Reading List

Source URL: xml.coverpages.org

Language: English - Date: 2001-12-10 20:16:57
86C:/Documents and Settings/Gaven Watson/Desktop/thesis/final/thesis.dvi

C:/Documents and Settings/Gaven Watson/Desktop/thesis/final/thesis.dvi

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2010-09-17 04:30:43
87C:/Documents and Settings/msah010/Desktop/THESIS/important!!/thesis.dvi

C:/Documents and Settings/msah010/Desktop/THESIS/important!!/thesis.dvi

Add to Reading List

Source URL: www.isg.rhul.ac.uk

Language: English - Date: 2012-09-24 07:55:50
88This article was published in 2003 and has not been updated or revised.  ® BEYOND DISCOVERY T H E PAT H F R O M R E S E A R C H T O H U M A N B E N E F I T

This article was published in 2003 and has not been updated or revised. ® BEYOND DISCOVERY T H E PAT H F R O M R E S E A R C H T O H U M A N B E N E F I T

Add to Reading List

Source URL: www.nasonline.org

Language: English - Date: 2014-08-04 15:09:41
89Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1  University of Maryland

Smooth Projective Hashing and Password-Based Authenticated Key Exchange from Lattices Jonathan Katz1? and Vinod Vaikuntanathan2 1 University of Maryland

Add to Reading List

Source URL: people.csail.mit.edu

Language: English - Date: 2010-02-04 10:06:47
90design file FINAL online.indd

design file FINAL online.indd

Add to Reading List

Source URL: www.chiefscientist.gov.au

Language: English - Date: 2012-07-18 01:42:25